Reliable, resistant endpoints for your anywhere workforce
Manage, track and recover devices with an always-on connection to every endpoint.
Take action on endpoints to protect data or maintain and prove compliance from anywhere.
Extend self-healing capabilities to devices and apps to ensure that critical controls are always present.
Gain an advantage for ransomware preparedness and recovery across the entire device fleet.
Secure access for the distributed workforce, but better
The only enterprise VPN solution that has been designed specifically with mobile workers in mind.
Ensure uninterrupted secure access with the world’s first self-healing Zero Trust platform.
Understand, diagnose, and improve the remote working experience.
Simplify your IT asset management by tracking and securing all your devices and data with one zero-touch, automated platform.
Maximize the value of your security spend with an unbreakable, undeletable connection to all your devices and data.
Hear from Zero Trust experts on achieving Resilient Zero Trust.
Recommendations and insights for implementing a "Zero Trust" strategy
Firmware-embedded by these leading systems manufacturers
Available from resellers and distributors worldwide
Application hardening and resilience made simple
Manage customer device and remediate risks from a single cloud-based console
Recommendations and insights for implementing a "Zero Trust" strategy.
Three key trends affecting K-12 IT strategies.
Learn why Absolute Software is the leader in Endpoint Resilience®
Review financial performance, stock info, and investor resources.
Known Historic Vulnerabilities
When vulnerabilities are brought to our attention we address issues and ensure the security of our customer environments.
Published: May 11, 2018 | Last Updated: Sep 24, 2020
Absolute Computrace Agent, as distributed on certain Dell Inspiron systems through 2009, has a race condition with the Dell Client Configuration Utility (DCCU), which allows privileged local users to change Computrace Agent's activation/deactivation status to the factory default via a crafted TaskResult.xml file.
Learn More
The stub component of Absolute Computrace Agent V70.785 executes code from a disk's inter- partition space without requiring a digital signature for that code, which allows attackers to execute code on the BIOS. This allows a privileged local user to achieve persistent control of BIOS behavior, independent of later disk changes.
Absolute Computrace Agent V80.845 and V80.866 does not have a digital signature for the configuration block, which allows attackers to set up communication with a web site other than the intended search.namequery.com site by modifying data within a disk's inter-partition space. This allows a privileged local user to execute arbitrary code even after that user loses access and all disk partitions are reformatted.